{"uuid": "4ecce38d-d2f5-4590-9a25-d392537fe955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55591", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1602", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55591\n\ud83d\udd39 Description: An\u00a0Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to\u00a0Node.js websocket module.\n\ud83d\udccf Published: 2025-01-14T14:08:34.207Z\n\ud83d\udccf Modified: 2025-01-14T20:57:13.464Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-24-535", "creation_timestamp": "2025-01-14T21:10:09.000000Z"}